Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction.However,due to the high nonlinearity of eye motion,how to ensure the robustness of external interfe...Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction.However,due to the high nonlinearity of eye motion,how to ensure the robustness of external interference and accuracy of eye tracking pose the primary obstacle to the integration of eye movements into today's interfaces.In this paper,we present a strong tracking unscented Kalman filter (ST-UKF) algorithm,aiming to overcome the difficulty in nonlinear eye tracking.In the proposed ST-UKF,the Suboptimal fading factor of strong tracking filtering is introduced to improve robustness and accuracy of eye tracking.Compared with the related Kalman filter for eye tracking,the proposed ST-UKF has potential advantages in robustness and tracking accuracy.The last experimental results show the validity of our method for eye tracking under realistic conditions.展开更多
If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and pa...If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and passwords for different servers.To solve these problems,a lot of authentication schemes for multi-server environment have been proposed.Recently,Odelu and Das et al.proposed a secure multi-server authentication protocol based on smart card,biometric and elliptic curve cryptography(ECC) .We firstly analyze Odelu et al.'s scheme and find some flaws as follows:1) the scheme may suffer Denial of Service(Dos) attack and insider attack;2) The scheme doesn't have strong robustness because improper work of the register center(RC) may lead to the collapse of the whole system;3) There are some design flaws in this scheme.For example,the user cannot choose his/her identity randomly and the register center needs to maintain a data table.In order to solve these problems,this paper proposes a new secure three-factor authentication protocol for multi-server environment based on Chebyshev chaotic map and secure sketch algorithm.To verify the security of the proposed scheme,we simulate our scheme using BAN logic and Pro Verif tool.Through a thorough analysis,we can see that the proposed schemenot only has stronger security but also has less computation cost than Odelu et al.'s protocol.展开更多
This paper present a new method based on Chaos Genetic Algorithm (CGA) to localize the human iris in a given image. First, the iris image is preprocessed to estimate the range of the iris localization, and then CGA is...This paper present a new method based on Chaos Genetic Algorithm (CGA) to localize the human iris in a given image. First, the iris image is preprocessed to estimate the range of the iris localization, and then CGA is used to extract the boundary of the ~iris . Simulation results show that the proposed algorithms is efficient and robust, and can achieve sub pixel precision. Because Genetic Algorithms (GAs) can search in a large space, the algorithm does not need accurate estimation of iris center for subsequent localization, and hence can lower the requirement for original iris image processing. On this point, the present localization algirithm is superior to Daugman's algorithm.展开更多
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conduc...The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously.展开更多
Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction. However, due to the high nonlinearity of eye motion, how to ensure the robust- ness of external in...Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction. However, due to the high nonlinearity of eye motion, how to ensure the robust- ness of external interference and accuracy of eye tracking poses the primary obstacle to the integration of eye movements into today's interfaces. In this paper, we present a strong tracking finite-difference extended Kalman filter algorithm, aiming to overcome the difficulty in modeling nonlinear eye tracking. In filtering calculation, strong tracking factor is introduced to modify a priori covariance matrix and improve the accuracy of the filter. The filter uses finite-difference method to calculate partial derivatives of nonlinear functions for eye tracking. The latest experimental results show the validity of our method for eye tracking under realistic conditions.展开更多
To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking sche...To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking scheme with superior localization, and further discusses the probability of false rejection (PFR) and the probability of false acceptance (PFA) of the proposed scheme. Moreover, four measurements are defined to evaluate the quality of a recovered image. In the proposed algorithm, the original image is divided into 2×2 blocks to improve localization precision and decrease PFR under occurrence of random tampering. The PFR under occurrence of region tampering can be effectively decreased by randomly embedding the watermark of each block in conjunction with a novel method of tamper detection. Compared with the current self-recovery fragile watermarking algorithms, the proposed scheme not only resolves the tamper detection problem of self-embedding watermarking, but also improves the robustness against the random tampering of self-embedding watermarking. In addition, the subjective measurements are provided to evaluate the performance of the self-recovery watermarking schemes for image authentication.展开更多
基金supported by the National Natural Science Foundation of China(No.60971104)the Program for New Century Excellent Talents in University of China(No.NCET-05-0794)the Young Teacher Scientific Research Foundation of Southwest Jiaotong University(No.2009Q032)
文摘Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction.However,due to the high nonlinearity of eye motion,how to ensure the robustness of external interference and accuracy of eye tracking pose the primary obstacle to the integration of eye movements into today's interfaces.In this paper,we present a strong tracking unscented Kalman filter (ST-UKF) algorithm,aiming to overcome the difficulty in nonlinear eye tracking.In the proposed ST-UKF,the Suboptimal fading factor of strong tracking filtering is introduced to improve robustness and accuracy of eye tracking.Compared with the related Kalman filter for eye tracking,the proposed ST-UKF has potential advantages in robustness and tracking accuracy.The last experimental results show the validity of our method for eye tracking under realistic conditions.
基金supported by Southwest University for Nationalities Foundation(No.2016NZYQN41)Key Technology Support Program of Sichuan Province(No.2014GZ0006)+1 种基金the Education Department of Sichuan Province(No.15ZB0489)Science and Technology Department in Sichuan province(No.2017JY0230)
文摘If a user wants to acquire different network services from various application servers in a traditional single server environment,the user must register these servers separately and remember different usernames and passwords for different servers.To solve these problems,a lot of authentication schemes for multi-server environment have been proposed.Recently,Odelu and Das et al.proposed a secure multi-server authentication protocol based on smart card,biometric and elliptic curve cryptography(ECC) .We firstly analyze Odelu et al.'s scheme and find some flaws as follows:1) the scheme may suffer Denial of Service(Dos) attack and insider attack;2) The scheme doesn't have strong robustness because improper work of the register center(RC) may lead to the collapse of the whole system;3) There are some design flaws in this scheme.For example,the user cannot choose his/her identity randomly and the register center needs to maintain a data table.In order to solve these problems,this paper proposes a new secure three-factor authentication protocol for multi-server environment based on Chebyshev chaotic map and secure sketch algorithm.To verify the security of the proposed scheme,we simulate our scheme using BAN logic and Pro Verif tool.Through a thorough analysis,we can see that the proposed schemenot only has stronger security but also has less computation cost than Odelu et al.'s protocol.
文摘This paper present a new method based on Chaos Genetic Algorithm (CGA) to localize the human iris in a given image. First, the iris image is preprocessed to estimate the range of the iris localization, and then CGA is used to extract the boundary of the ~iris . Simulation results show that the proposed algorithms is efficient and robust, and can achieve sub pixel precision. Because Genetic Algorithms (GAs) can search in a large space, the algorithm does not need accurate estimation of iris center for subsequent localization, and hence can lower the requirement for original iris image processing. On this point, the present localization algirithm is superior to Daugman's algorithm.
基金the National Natural Science Foundation of China (Grant No. 60572027)the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794)+2 种基金the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033)the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201)the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)
文摘The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously.
基金Supported by the National Natural Science Foundation of China (Grant No. 60572027)the Outstanding Young Researchers Foundation of Sichuan Province (Grant No. 03ZQ026-033)+1 种基金the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794)the Young Teacher Foundation of Mechanical School (Grant No. MYF0806)
文摘Non-intrusive methods for eye tracking are important for many applications of vision-based human computer interaction. However, due to the high nonlinearity of eye motion, how to ensure the robust- ness of external interference and accuracy of eye tracking poses the primary obstacle to the integration of eye movements into today's interfaces. In this paper, we present a strong tracking finite-difference extended Kalman filter algorithm, aiming to overcome the difficulty in modeling nonlinear eye tracking. In filtering calculation, strong tracking factor is introduced to modify a priori covariance matrix and improve the accuracy of the filter. The filter uses finite-difference method to calculate partial derivatives of nonlinear functions for eye tracking. The latest experimental results show the validity of our method for eye tracking under realistic conditions.
基金the Program for New Century Excellent Talents in University of China (Grant No.NCET-05-0794)Southwest Jiaotong University Doctors Innovation Funds (2007)Application Basic Foundation of Sichuan Province, China (Grant No.2006 J13-10-5)
文摘To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking scheme with superior localization, and further discusses the probability of false rejection (PFR) and the probability of false acceptance (PFA) of the proposed scheme. Moreover, four measurements are defined to evaluate the quality of a recovered image. In the proposed algorithm, the original image is divided into 2×2 blocks to improve localization precision and decrease PFR under occurrence of random tampering. The PFR under occurrence of region tampering can be effectively decreased by randomly embedding the watermark of each block in conjunction with a novel method of tamper detection. Compared with the current self-recovery fragile watermarking algorithms, the proposed scheme not only resolves the tamper detection problem of self-embedding watermarking, but also improves the robustness against the random tampering of self-embedding watermarking. In addition, the subjective measurements are provided to evaluate the performance of the self-recovery watermarking schemes for image authentication.